+44 (0)203 88 020 88

Menu

Search

Cyber Security News & Articles

 

Cyber Security
News & Articles

Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic

What is Security Awareness Training

Security Awareness Training is an essential component of any organisation’s information security.

Even though it is mandated by frameworks such as PCI-DSS or ISO 27001, Security Awareness Training should be more than just a compliance exercise.  A good security awareness training programme will drive changes in behaviour amongst staff, suppliers and customers that will improve the security stance of the whole organisation.

The term ‘awareness’ implies the training is focused on knowledge transfer however effective modern Security Awareness Training is focused more on changing behaviour not simply passing on information.

If you are a security or network manager responsible for ensuring security awareness training happens, this article will provide you with 5 key questions your training needs to address.

To be effective, your Security Awareness Training programme needs to provide your team with the answers to each of these questions:

What are the policies that affect me?

You can’t win at a game if you do not understand the rules.  So, the foundation of any awareness training is ensuring that everyone has access to the Information Security Policy (the main policy, and all its related policies and procedures) and has a chance to read it and ask questions on any sections they do not understand.

You cannot comply with a policy that you do not know exists or that you do not understand.

Checklist:

  • Provide links to Information Security Policy Library
  • Consider a summary video or document which outlines how to find the answers to common policy questions or use cases in the security policy library

 

What are the tools I can use to help me keep data secure?

Security breaches are more often enabled by employee error and ignorance rather than malice.  Your Security Awareness Training programme is the best opportunity to ensure every team member knows the right tools to use in order to securely and safely complete their tasks each day. It is here you can counter the impression that ‘the security team gets in my way’ and replace it with ‘the security team provides me with tools so I can easily do my job.’

When well-meaning team members mis-use security tools they can put data or systems at risk.  A typical example of this kind of error would be complying with the need to use a password to protect the contents of a spreadsheet of customer details – and then including the password in the body of the same email when sending the document to an external partner.

Checklist

  • Explain how to use software tools provided for secure data transfer and encryption – show how to select the correct settings or options for different tasks.
  • Provide an easy to follow guide that helps less technical staff pick the right tools for each job

 

What are the things I must not do?

You don’t know what you don’t know.  All security managers have a story or two of well-meaning colleagues who left the crown jewels exposed due to their own ignorance of the risks and dangers.  The security press is filled weekly with tales of AWS buckets or customer databases left exposed and unsecured on the Internet.

People are comfortable with certainty and can happily cope with ‘thou shalt not’ lists of commandments – as long as they are easy to understand, and a safe alternative is provided which allows them to get their job done.

Consider how posters, desktop reminders and intranet homepage messaging can help reinforce key safety messages as part of an ongoing programme to security awareness.  You do not need to cover everything in the first few days – instead create a roll out plan which lasts all year.

People tune out when they hear the same message on repeat – so variety is essential in order to improve the impact of your communication.

A communications plan which focuses on a different aspect of security each month – along with articles on your Intranet and posters in the offices – helps security become a way of life rather than a one-off annual exercise.

An example annual security awareness communications plan:

Month Key Messaging
January Safe and Strong Passwords
February How to spot Phishing emails
March Backups
April Keep software updated
May How to raise the alarm
June Test incident response plan
July Remote working safely
August Safe and Strong passwords
September Sharing Data securely
October DO’s and DON’Ts
November Backups
December Phishing attacks

 

Checklist

  • Create an annual messaging plan which focuses on different key messages each month
  • Provide a clear and non-technical list of DO NOTs for everyone to follow

 

What are the risks / danger signs I should look out for?

When the fire alarm sounds everyone in your office knows what to do.  They leave their desk, take the stairs and go stand in the car park waiting for the firemen to arrive.  Everyone knows what to do, and in the event of a real fire, rather than a drill, no-one would have to ‘make it up as they go along.’  If someone smells smoke, they know how to raise the alarm and what they should and should not do next.

In a cyber-security context – how can you teach your team to be ‘smoke detectors?’

Technological measures will never be 100% effective against evolving cyber-security threats. The last line of defence is the Human Firewall – the accounts clerk who decides whether or not to open the excel file attachment in the email they just received.

By using examples and demonstrating how criminals can attempt social engineering your team can be trained to spot potential threats or unexpected behaviours – and raise the alarm with confidence.

Simulated phishing attacks can be effective in helping staff realise how easily they can be tricked into clicking on a malicious link.

Identify the risks most likely to impact your business and provide training around them.  This could include:

  • Phishing attacks by email
  • Social Engineering on the phone
  • Social Engineering in person
  • Attacks against devices exposed to the internet
  • Compromised computers used by remote-workers
  • Supply chain attacks
  • Compromised devices in connected networks – such as supplier’s network which has a VPN link to your network

 

Checklist

  • Provide practical examples in the training so people can see how the systems they use every day could be attacked
  • Occasional simulated phishing attacks can keep staff on their toes and watchful

 

How should I respond if I suspect a threat?

Finally, staff should be given clear guidance and permission to ‘press the fire alarm’ if they suspect a cyber-threat to the business.  This will look different in each organisation – but just as the fire alarm is easily found and visible in every office – the means for raising the alarm for a cyber-attack needs to be equally accessible.

Some frameworks, such as PCI-DSS, mandate regular testing of the Cyber Security Incident Response plan – the fire-drill in other words.

Checklist

  • Hold regular ‘fire-drills’ so the whole team knows what to do if they suspect a security threat.
  • Ensure contact details for the cyber first-responders are well known and easily found.

 

Security Awareness Training will help your team embed cyber-security as ‘business as usual’ rather than an inconvenient afterthought.

 

 

 

Subscribe to our monthly newsletter today

If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter. 

We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.

Why Choose SecureTeam?

CREST
CCS
ISO9001
ISO27001
CE-PLUS

Customer Testimonials

“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”

Aim Ltd Chief Technology Officer (CTO)

"Within a very tight timescale, SecureTeam managed to deliver a highly professional service efficiently. The team helped the process with regular updates and escalation where necessary. Would highly recommend"

IoT Solutions Group Limited Chief Technology Officer (CTO) & Founder

“First class service as ever. We learn something new each year! Thank you to all your team.”

Royal Haskoning DHV Service Delivery Manager

“We’ve worked with SecureTeam for a few years to conduct our testing. The team make it easy to deal with them; they are attentive and explain detailed reports in a jargon-free way that allows the less technical people to understand. I wouldn’t work with anyone else for our cyber security.”

Capital Asset Management Head of Operations

“SecureTeam provided Derbyshire's Education Data Hub with an approachable and professional service to ensure our schools were able to successfully certify for Cyber Essentials. The team provided a smooth end-to-end service and were always on hand to offer advice when necessary.”

Derbyshire County Council Team Manager Education Data Hub

“A very efficient, professional, and friendly delivery of our testing and the results. You delivered exactly what we asked for in the timeframe we needed it, while maintaining quality and integrity. A great job, done well.”

AMX Solutions IT Project Officer

“We were very pleased with the work and report provided. It was easy to translate the provided details into some actionable tasks on our end so that was great. We always appreciate the ongoing support.”

Innovez Ltd Support Officer

Get in touch today

If you’d like to see how SecureTeam can take your cybersecurity posture to the next level, we’d love to hear from you, learn about your requirements and then send you a free quotation for our services.

Our customers love our fast-turnaround, “no-nonsense” quotations – not to mention that we hate high-pressure sales tactics as much as you do.

We know that every organisation is unique, so our detailed scoping process ensures that we provide you with an accurate quotation for our services, which we trust you’ll find highly competitive.

Get in touch with us today and a member of our team will be in touch to provide you with a quotation. 

0

No products in the basket.

No products in the basket.